Kerberos Encryption Keys
The sekurlsa::ekeys
Mimikatz module will dump the Kerberos encryption keys of currently logged on users. Since most modern Windows services choose to use Kerberos over NTLM, leveraging these instead of NTLM hashes makes more sense for blending into normal authentication traffic.
These keys can be used in a variety of Kerberos abuse scenarios.
This command requires elevated privileges.
\
\
There is a known issue where Mimikatz may incorrectly label all of the hashes as des_cbc_md4
.
\
In this case, the AES256 key is the one we want. These hashes are not automatically populated into the Credential data model, but they can be added manually via View > Credentials > Add.
\
OPSEC This module also opens a read handle to LSASS.
Last updated